Authentication & authorization News

  • October 11, 2016 11 Oct'16

    DRM 2.0

    Digital rights management is evolving in response to the rise of cloud services, the diversification of user end-points and increasing cyber-threats. New products are emerging to overcome the ...

  • August 31, 2016 31 Aug'16

    Ping: Distributed ledgers are the future of identity security

    SearchCloudSecurity's interview with Ping Identity CEO Andre Durand explores how distributed ledgers can be used for identity and access management.

  • August 31, 2016 31 Aug'16

    Okta identity management extends to APIs

    The new API Access Management platform from Okta lets businesses build mobile apps that have identity-based access to third-party software and services.

  • May 20, 2016 20 May'16

    Senate bill would quash unlimited Rule 41 government hacks

    Rule 41 changes face bipartisan opposition in Senate with the Wyden-Paul bill to rein in the expansion of authority to let the government hack unlimited numbers of devices with a single warrant.

View All News

Authentication & authorization Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Authentication & authorization Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Authentication & authorization

Learn to apply best practices and optimize your operations.

  • Identity of things? IAM system to change as IoT invades the workplace

    Companies in certain industries -- manufacturing, healthcare and critical infrastructure -- are already dealing with securing the internet of things; others will have to start. Continue Reading

  • What's New in IAM Security and Strategy

    Most of the pivotal changes in identity and access management, or IAM, were discussed and developed at least ten years ago. Deployment of advanced IAM security technology has been glacial in comparison to most other security technologies because of its unavoidable complexity and its inherent intertwining with virtually every aspect of corporate IT. What's changed in recent years is that some of the use cases that push toward IAM concepts like federation and cloud-based identity stores have picked up considerable steam.

    In this three-part technical guide, we consider how enterprise IAM strategy needs to adapt so that companies can cope securely with paradigm-changing technology like cloud services, software-defined everything and the internet of things. Readers of this guide to IAM security today will learn how IAM strategy and architecture have evolved and how corporations must adapt their systems if they are to employ identity and access management effectively and safely through the next decade.

     Continue Reading

  • When your IAM policy encounters the internet of things

    Aging identity and access management tools, and technical innovations like the internet of things, make it imperative that you update your enterprise IAM policy now. Here's how. Continue Reading

View All Manage

Problem Solve Authentication & authorization Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve